The same thing happens with the IBM Thinkcentre A50, MT-M 8089-74G.
With 2.6.8-2-686 it seizes: the clock starts jumping forward and backwards
(between 16:01 and 17:12, the time I discovered that), the screen blanks out
(since, suddenly, the system has spent 1 hour and 11 minutes idle ;-)), and
reassign 299875 kernel
retitle 299875 CAN-2005-0384: Remote Linux DoS on ppp servers
tag 299875 patch security
thanks
Paul Mackerras says that this bug affects all kernels (2.4 and 2.6) and
can be easily triggered remotely, but is only a CPU DoS.
from 2.6.11.4:
diff -Nru
Processing commands for [EMAIL PROTECTED]:
reassign 299875 kernel
Bug#299875: ppp: out-of-memory 30min after LCP terminated by peer
Bug reassigned from package `ppp' to `kernel'.
retitle 299875 CAN-2005-0384: Remote Linux DoS on ppp servers
Bug#299875: ppp: out-of-memory 30min after LCP
Processing commands for [EMAIL PROTECTED]:
severity 289690 serious
Bug#289690: (no subject)
Severity set to `serious'.
thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--
To
severity 289690 serious
thanks
This bug should really be fixed for sarge... releasing with broken Samba
support isn't an option.
I also encountered the bug on my side (with version 2.6.8-13 of the
kernel).
You must be able to find out the relevant change in the kernel bitkeeper
history, isn't
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
On Tue, Mar 08, 2005 at 10:38:17AM +0100, [EMAIL PROTECTED] wrote:
Greetings.
I've been running sarge in the last year, and recently I performed
an aptitude dist-upgrade that, among other packages, upgraded
kernel-image-2.6.8-1-686 to kernel-image-2.6.8-2-686.
Thereafter, my PCs and
Package: kernel-image-2.6.8-2-sparc64
Version: 2.6.8-6
Followup-For: Bug #271315
I confirm hitting this bug with a Type 5c keyboard, on an UltraSparc
5, too. Keymap is completely baroque, e.g. the delete key acts as
enter, some Fn keys act as normal characters like u or n and
$DEITY knows what
Package: kernel-image-2.6.8-powerpc
Version: 2.6.8-11
Severity: important
I have noticed that the clock in the evening differs about 15 min
from the actual time. My mac mini runs 24/7 with ntpdate running daily
to sync the clock.
I also noticed that hwclock does not work at all for example:
On Mon, 2005-03-14 at 22:16 -0800, Matt Taggart wrote:
dann frazier writes...
fyi, I have a patch to the kernel-image build system that would spit out
a separate package w/ a debug kernel image module set under /usr/lib.
I did this in the 2.4.25 timeframe, and I was getting ~204M debug
Geoff Crompton wrote:
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Justification: root security hole
There is a local integer overflow vulnerability in the sys_epoll_wait()
call. See following for detail:
http://www.securityfocus.com/bid/12763/
Apologies if already
Justin Pryzby wrote:
I assume that you have seen this:
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.4
yes i have*now*. obviously this was a security issue (CAN-2005-0384)
and i *guess* that's why the issue was not discussed in public. what pity
and what a waste of time in
Hello,
I have had some difficulties to get my ISDN card running (SITECOM PCI
DC-105V2). Rasca [EMAIL PROTECTED], give me a useful solution :
http://mpx.freeshell.net/sitecom_dc105v2.html :
Step
On Fri, Mar 11, 2005 at 03:50:59PM +0100, Sven Luther wrote:
Hello,
I have looked at the 2.6.11 kernel status again, and it seems to me that from
the remaining TODO items of the 2.6.10-2.6.11 porting, we had the following
things still on TODO :
1) the ia64 patch. Those will be dropped
Indeed they should not be there.
I guess the best thing to do is to file
a bug against the archive and then ping one
of the ftp-masters.
On Fri, Mar 11, 2005 at 12:43:34PM -0600, Jeffrey Austen wrote:
I noticed several kernel files in testing which probably should not be
there. Here is a list
On Sat, Mar 12, 2005 at 10:42:41AM +0100, Bernd Herd wrote:
Hallo,
I'm running a dual-opteron box Celsius V810 with testing
kernel-image-2.6.8-2-686-smp and kernel-image-2.6.8-10-amd64-k8-smp
does also work (just that X cannot find the mouse before I do cp -a
/.dev/psaux /dev/psaux.
On Sun, Mar 13, 2005 at 05:38:33AM +0100, Thiemo Seufer wrote:
tags 299204 +confirmed
reassign 299204 kernel-patch-2.4.27-mips
thanks
This bug is generic for all debian mips/mipsel 2.4.27 kernels, caused
by a broken patch. A fixed version is available in the debian-kernel
SVN, I plan to
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security patch
Hello,
CAN-2004-1190 reads:
SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not
properly check commands sent to CD devices that have been opened
read-only, which could allow local users to
Processing commands for [EMAIL PROTECTED]:
# Automatically generated email from bts, devscripts version 2.8.11
retitle 300162 [CAN-2004-1190]: Improper command checking for CDs, allowing
local users to conduct unauthorized writes to firmware
Bug#300162: [CAN-2004-1191]: Improper command
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security patch
CAN-2004-1191 reads:
Race condition ... when run on SMP systems that have more than 4GB of
memory, could allow local users to read unauthorized memory from
foreign memory pages. Apparantly it also allows remote
On Thu, Mar 17, 2005 at 05:09:38PM +0900, Horms wrote:
On Fri, Mar 11, 2005 at 03:50:59PM +0100, Sven Luther wrote:
1) we package the plain 2.6.11 as provided by upstream in main and upload
it. Those non-free firmware blobs are for the most part in main already,
and
it seems the RM
24 matches
Mail list logo